CVE-2021-47121

In the Linux kernel, the following vulnerability has been resolved: net: caif: fix memory leak in cfusbl_device_notify In case of caif_enroll_dev() fail, allocated link_support won't be assigned to the corresponding structure. So simply free allocated pointer in case of error.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*

History

07 Jan 2025, 17:30

Type Values Removed Values Added
CPE cpe:2.3:o:linux:linux_kernel:5.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc3:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:5.13:rc4:*:*:*:*:*:*
CWE CWE-401
First Time Linux
Linux linux Kernel
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/46403c1f80b0d3f937ff9c4f5edc63bb64bc5051 - () https://git.kernel.org/stable/c/46403c1f80b0d3f937ff9c4f5edc63bb64bc5051 - Patch
References () https://git.kernel.org/stable/c/4d94f530cd24c85aede6e72b8923f371b45d6886 - () https://git.kernel.org/stable/c/4d94f530cd24c85aede6e72b8923f371b45d6886 - Patch
References () https://git.kernel.org/stable/c/7f5d86669fa4d485523ddb1d212e0a2d90bd62bb - () https://git.kernel.org/stable/c/7f5d86669fa4d485523ddb1d212e0a2d90bd62bb - Patch
References () https://git.kernel.org/stable/c/81afc61cb6e2b553f2c5f992fa79e0ae73857141 - () https://git.kernel.org/stable/c/81afc61cb6e2b553f2c5f992fa79e0ae73857141 - Patch
References () https://git.kernel.org/stable/c/9ea0ab48e755d8f29fe89eb235fb86176fdb597f - () https://git.kernel.org/stable/c/9ea0ab48e755d8f29fe89eb235fb86176fdb597f - Patch
References () https://git.kernel.org/stable/c/cc302e30a504e6b60a9ac8df7988646f46cd0294 - () https://git.kernel.org/stable/c/cc302e30a504e6b60a9ac8df7988646f46cd0294 - Patch
References () https://git.kernel.org/stable/c/dde8686985ec24d6b00487080a906609bd613ea1 - () https://git.kernel.org/stable/c/dde8686985ec24d6b00487080a906609bd613ea1 - Patch
References () https://git.kernel.org/stable/c/e8b37f5009ea7095529790f022859711e6939c76 - () https://git.kernel.org/stable/c/e8b37f5009ea7095529790f022859711e6939c76 - Patch

21 Nov 2024, 06:35

Type Values Removed Values Added
References () https://git.kernel.org/stable/c/46403c1f80b0d3f937ff9c4f5edc63bb64bc5051 - () https://git.kernel.org/stable/c/46403c1f80b0d3f937ff9c4f5edc63bb64bc5051 -
References () https://git.kernel.org/stable/c/4d94f530cd24c85aede6e72b8923f371b45d6886 - () https://git.kernel.org/stable/c/4d94f530cd24c85aede6e72b8923f371b45d6886 -
References () https://git.kernel.org/stable/c/7f5d86669fa4d485523ddb1d212e0a2d90bd62bb - () https://git.kernel.org/stable/c/7f5d86669fa4d485523ddb1d212e0a2d90bd62bb -
References () https://git.kernel.org/stable/c/81afc61cb6e2b553f2c5f992fa79e0ae73857141 - () https://git.kernel.org/stable/c/81afc61cb6e2b553f2c5f992fa79e0ae73857141 -
References () https://git.kernel.org/stable/c/9ea0ab48e755d8f29fe89eb235fb86176fdb597f - () https://git.kernel.org/stable/c/9ea0ab48e755d8f29fe89eb235fb86176fdb597f -
References () https://git.kernel.org/stable/c/cc302e30a504e6b60a9ac8df7988646f46cd0294 - () https://git.kernel.org/stable/c/cc302e30a504e6b60a9ac8df7988646f46cd0294 -
References () https://git.kernel.org/stable/c/dde8686985ec24d6b00487080a906609bd613ea1 - () https://git.kernel.org/stable/c/dde8686985ec24d6b00487080a906609bd613ea1 -
References () https://git.kernel.org/stable/c/e8b37f5009ea7095529790f022859711e6939c76 - () https://git.kernel.org/stable/c/e8b37f5009ea7095529790f022859711e6939c76 -
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: net: caif: corrige la pérdida de memoria en cfusbl_device_notify En caso de que falle caif_enroll_dev(), el link_support asignado no se asignará a la estructura correspondiente. Así que simplemente libera el puntero asignado en caso de error.

15 Mar 2024, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-15 21:15

Updated : 2025-01-07 17:30


NVD link : CVE-2021-47121

Mitre link : CVE-2021-47121

CVE.ORG link : CVE-2021-47121


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-401

Missing Release of Memory after Effective Lifetime